Professional Documents
Culture Documents
www.elsevier.com/locate/jprocont
Abstract
One of the most active areas of research in the nineties has been the study of the interplay between system identication and
robust control design. It has led to the development of control-oriented identication design, the paradigm being that, since the
model is only a tool for the design of a controller, its accuracy (or its error distribution) must be tuned towards the control design
objective. This observation has led to the concept of iterative identication and control design and, subsequently, to model-free
iterative controller design, in which the controller parameters are iteratively tuned on the basis of successive experiments performed
on the real plant, leading to better and better closed-loop behaviour. These iterative methods have found immediate applications in
industry; they have also been applied to the optimal tuning of PID controllers. This paper presents the progress that has been
accomplished in iterative process control design over the last decade. It is illustrated with some applications in the chemical industry. # 2002 Elsevier Science Ltd. All rights reserved.
Keywords: Identication for control; Validation; Iterative controller tuning
1. Introduction
Iterative process control is a control design methodology that has emerged in the nineties as a result of intense
research eorts aimed at bridging the gap between system
identication and robust control analysis and design. In
order to give the reader an idea about how wide this gap
was, we quote from a keynote lecture delivered at the 1991
IFAC Symposium on Identication [1].1
The last ten years have seen the emergence of
robust control theory as a major research activity.
During the same period, research in system identication has dwindled, and it might be tempting to
believe that most of the theoretical questions in
identication theory have been resolved for some
time. The surprising fact is that much of robust control theory is based on prior descriptions of model
uncertainty or model errors which classical identication theory has been incapable of delivering. Conversely, until recently identication theorists have
not spent much eort in trying to produce the
* Tel.: +32-10-47-25-90; fax: +32-10-47-21-80.
E-mail address: gevers@csam.ucl.ac.be (M. Gevers).
1
Our extensive quote should of course not be construed as
approval of the ideas expressed in that paper.
accurate uncertainty bounds around their estimated models that their robust control design colleagues were taking for granted. It is as if, until a few
years ago, the control design community and the
identication community had not been talking much
to each other. The gap between the surrealistic premises on which much of robust control design theory
is built and the failure of identication theory to
deliver accurate uncertainty bounds in the face of
unmodelled dynamics has brought to light major
deciencies in both theories, and a sudden awareness from around 1988 of the need to understand
better the interactions between both theories.
Surely, a natural place to search for an understanding of the interactions between identication
and robust control design is in the adaptive control
community. Indeed, adaptive control combines the
design of an on-line identier with that of a control
law . . . . . . An essential feature of adaptive control,
however, is that the identication is performed in
closed loop and that the controller therefore
impacts on the estimated model and on its quality
(i.e. its error with respect to the true system). It is
therefore to be expected that the separate designs of
the identier and of the controller without regard
for the eect of the control law on the identied
0959-1524/02/$ - see front matter # 2002 Elsevier Science Ltd. All rights reserved.
PII: S0959-1524(01)00018-X
520
521
522
G z; ^ of G
0, from some parametrized set of low
order models Gz; j 2 D , where D is a subset of
the Euclidean space. Consider a control law
ut Czrt
yt ;
vt :
ut
1 G0 C
1 G0 C
vt
5
yt
y^ t
rt
^
1 G0 C 1 G C
1 G0 C
After some straightforward manipulations, this can be
rewritten as
i
h
yt
y^ t Sz yt
G z; ^ ut :
6
Eq. (6) can be seen as an equality between a control
performance error on the left hand side (LHS) and a
ltered identication error on the right hand side
(RHS). Indeed, the RHS is a ltered (by S(z)) version of
the output error yt
G(z,^ )ut, where ut and yt are collected on the actual closed loop system of Fig. 1. Thus,
it appears that if is obtained by minimizing the mean
square of the RHS of (6), i.e. by closed-loop identication with a lter S(z), then this will minimize the mean
square control performance error. In other words,
apparently (6) shows that we get a perfect match
between control error and identication error. However, life is more subtle and complicated. Indeed, the
controller C(z) is also a function of the model parameter
vector via (3). Since the data collected on the real
closed-loop system of Fig. 1 are a function of C(z), they
are also dependent on . Hence, a more suggestive and
correct way to write (6) is as follows:
yt
y^ t Szyt
Gz; ut
yt
4
Even though the RHS of (7) looks like a closed-loop
prediction error, it cannot be minimized by standard
identication techniques, because appears everywhere
and not just in G(z,).
We have illustrated the fact that with the simplest
possible control design mechanism, namely model
reference control, one can apparently equate a control
performance error to an identication error, but that
this identication error cannot be minimized by standard identication techniques because the parameter
vector appears in more than just the model G(z,). In
3
It was called that way in [11,12] because, if the closed-loop
transfer function of the actual system was equal to the reference model
S(z), this error would contain only the noise contribution.
where the data lter S(z,) is proportional to the sensitivity function of the design loop [compare with (3)] and
is now also -dependent. Again, we do not know how to
minimize the RHS of (8) with respect to .
As a consequence, the approach suggested in all
known identication for control schemes is to perform
identication and control design steps in an iterative
way, whereby the i-th identication step is performed on
ltered closed-loop data collected on the actual closedloop system with the (i
1)-th controller operating in the
loop. This corresponds to an i-th closed loop identication step in which the following ltered prediction error
is minimized with respect to , for xed ^ i
1 :
h
i
yt
y^ t S z; ^ i
1 yt ^ i
1
Gz; ut ^ i
1 :
9
We refer the reader to [2,14,15] for details and for a
survey on such iterative schemes.
Assume that one has chosen a model-based certainty
equivalence control design criterion, such that any
model G^ is mapped into a corresponding controller
C(G^ ), e.g. the Model Reference criterion above. Then an
interesting question is whether these iterative identication and control schemes converge
to the minimum of
4
the achieved cost over the set C
CGz; 8 2 D of
all such certainty equivalence controllers. This corresponds to asking whether by iteratively minimizing over
the mean square of the prediction errors dened by
(9), one will converge to the minimum of
2
4
J E Sz; yt
Gz; ut :
10
523
524
11
Cr G0
4
d
d
r t
yt
y~ t yt
yt
1 Cy G0
1
vt :
12
1 Cy G0
If a reference model is used this error can also be
written as
525
y~ t
Cr G0
1 Cy G0
Td rt
1
vt :
1 Cy G0
"
13
15
Cr G0
;
1 Cy G0
S0
1
:
1 Cy G0
16
N
2 1 h
2 i
1 X
ydt
T0 rt E S0 vt
2N t1
2
"
#
N
X
1
E
l
ut 2 :
2N
t1
N
N
X
X
@J
1
@y~ t
@ut
E
l ut
:
y~ t
@
N
@
@
t1
t1
17
@J
@
If the gradient
could be computed, then the solution of (17) would be obtained by the following iterative
algorithm:
i1 i
i R
1
i
@J
i :
@
18
y1 i T0 i r S0 i v
1i
y2 i T0 i r
y1 i
S0 i v2i
yielding y3 i T0 i r S0 i v3i :
yielding
yielding
To ease up the rather heavy notations, we have dropped the subscript t from all time signals in the following expressions.
526
19
@Cy
@Cy
@Cr
3
2
i y i
i
i y i
@
@
@
20
@y
is an unbiased estimate of @
(i).
The three experiments described above generate corresponding control signals:
u1 i S0 i Cr i r
Cy i v1i ;
u2 i S0 i Cr i r
y1 i
Cy i v2i ;
u3 i S0 i Cr i r
Cy i v3i :
These signals can similarly be used to generate the
estimates of the input related signals required for the
estimation of the gradient (17). Indeed, u1(i) is a perfect
realization of u(i),
ui u1 i :
21
while
b
@u
1
4
i
@
Cr i
@Cy
@Cy
@Cr
3
2
i
i u i
i u i
@
@
@
22
@u
is an unbiased estimate of @
(i). An experimentally based
estimate of the gradient of J can be formed by taking
!
N
b
ct
ct
@J
@y
@u
1X
i
y~ t i
i lut i
i :
23
@
N t1
@
@
b
@J
i
@
24
527
Fig. 4. Control error over a 24-h period before tuning and after 6 iterations of IFT.
Fig. 5. Histogram of control error over 2-week period before tuning and after 6 iterations of IFT.
Table 1
Calculated and predicted cost
Iteration
Cost (measured)
1
2
3
4
5
6
0.80
1.00
0.57
0.37
0.22
0.14
0.36
0.59
0.35
0.18
0.15
0.11
528
Fig. 6. Bode diagram of the 2-degree-of-freedom controller before tuning (full), after 3 iterations (dashed) and after 6 iterations of the algorithm
(dotted).
"
#
N
N
X
X
1
2
2
E
Jm
y~ t l ut :
2N
tt0
t1
We say in such a case that a mask of length t0 is put
on the transient response of the tracking error. Often it
is not known a priori how much time is required to
achieve a setpoint change without overshoot. In such
case, one can perform the IFT iterations by initially
applying a long mask, and then gradually reducing the
length of this mask until oscillations start occurring.
We illustrate this idea with an example presented in
[52]. Consider the plant
1
Gs 2
s 0:1s 1
One wishes to tune a PID controller in order to
achieve a settling time of 20 s for the closed loop system.
The initial PID parameter values were taken as
K=0.025, Ti=2 and Td=1, yielding the very sluggish
response shown in Fig. 7.
The classical IFT criterion was then applied with a
desired response shown in dotted line in Fig. 8, with the
achieved response shown in full line on that same gure.
This response is very unsatisfactory, due to an unfortunate
choice of initial parameters.
6. Conclusions
Iterative redesign of controllers using data collected
on the operating closed loop system has emerged as a
new, powerful and successful control design methodology, as a result of signicant progress accomplished in
the nineties on the understanding of the interplay
between identication and control design. Most of the
schemes are based on model and controller updates; they
require safeguards such as cautious changes between
successive controllers. The study of these identication
for control schemes has somewhat surprisingly also led
to iterative schemes that are entirely model-free.
In this paper we have focused on the design of the
nominal model and/or controller via these iterative
schemes, since these have given rise to the more practical
529
Fig. 8. Optimal closed-loop step response (full) obtained with the classical IFT criterion and using the desired response (dashed).
Fig. 9. Optimal closed loop step response obtained with the IFT criterion using masks of decreasing length.
design methods, well suited for process control applications. We have barely touched upon the vast amount of
progress accomplished on model uncertainty estimation,
and have completely left aside our recent theoretical
work on model and controller validation.
Acknowledgements
References
The work reported herein is the result of collaborations with a large number of co-authors over the last 10
years. I would like to acknowledge B.D.O. Anderson, P.
Ansay, R.R. Bitmead, X. Bombois, B. Codrons, F. De
Bruyne, G.C. Goodwin, S. Gunnarsson, H. Hjalmarsson, C. Kulcsar, J. Leblond, O. Lequin, L. Ljung, B.
Ninness, A.G. Partanen, M.A. Poubelle, G. Scorletti, L.
530
[3] B. Ninness, G.C. Goodwin, Estimation of model quality, Automatica 31 (12) (1995) 3274.
[4] P. Bendotti, B. Codrons, C. M. Falinower, M. Gevers, Control
oriented low order modelling of a complex PWR plant: a comparison between open loop and closed loop methods, in: Proceedings of the 37th IEEE Conference on Decision and Control,
Tampa, Florida, 1998, pp. 3390-3395.
[5] K. Zhou, J.C. Doyle, K. Glover, Robust and Optimal Control,
Prentice Hall, New Jersey, 1995.
[6] R.A. de Callafon, P.M.J. Van den Hof, Suboptimal feedback
control by a scheme of iterative identication and control design,
Mathematical Modelling of Systems 3 (1) (1997) 77101.
[7] M. Gevers, X. Bombois, B. Codrons, F. De Bruyne, G. Scorletti,
The role of experimental conditions in model validation for control, in: A. Garulli, A. Tesi, A. Vicino (Eds.), Robustness in
Identication and Control Proceedings of Siena Workshop,
July 1998, Vol. 245 of Lecture Notes in Control and Information
Sciences, Springer, Berlin, 1999, pp. 7286.
[8] X. Bombois, M. Gevers, G. Scorletti, A measure of robust stability for an identied set of parametrized transfer functions, IEEE
Transactions on Automatic Control 45 (11) (2000) 21412145.
[9] X. Bombois, M. Gevers, G. Scorletti, B.D.O. Anderson,
Robustness analysis tools for an uncertainty set obtained by prediction error identication. Automatica, in press.
[10] M. Gevers, X. Bombois, B. Codrons, G. Scorletti, B.D.O.
Anderson, Model validation for control and controller validation: a prediction error identication approach, submitted for
publication to Automatica.
[11] K.J. Astrom, Matching criteria for control and identication, in:
Proceedings of the 2nd European Control Conference, Groningen, The Netherlands, 1993, pp. 248251.
[12] K.J. Astrom, J. Nilsson, Analysis of a scheme for iterated identication and control, in: Proceedings of the IFAC Symposium on
Identication, Copenhagen, Denmark, 1994, pp. 171176.
[13] Z. Zang, R.R. Bitmead, M. Gevers, Iterative weighted leastsquares identication and weighted LQG control design, Automatica 31 (11) (1995) 15771594.
[14] P.M.J. Van den Hof, R.J.P. Schrama, Identication and controlclosed-loop issues, Automatica 31 (1995) 17511770.
[15] R.R. Bitmead, Iterative control design approaches, in: Proceedings of the 12th IFAC World Congress, Sydney, Australia, 1993,
Vol. 9, pp. 381384.
[16] H. Hjalmarsson, S. Gunnarsson, M. Gevers, Optimality and suboptimality of iterative identication and control design schemes,
in: Proceedings of the American Control Conference 95, 1995b,
Vol. 4, pp. 25592563.
[17] A.G. Partanen, R.R. Bitmead, The application of an iterative
identication and controller design to a sugar cane crushing mill,
Automatica 31 (1995) 15471563.
[18] R.J.P. Schrama, O.H. Bosgra, Adaptive performance enhancement by iterative identication and control design, Int. Journal of
Adaptive Control and Signal Processing 7 (5) (1993) 475487.
[19] R.A. de Callafon, P.M.J. Van den Hof, M. Steinbuch, Controlrelevant identication of a compact disc pick-up mechanism, in:
Proceedings of the 1993 IEEE Conference on Decision and Control. San Antonio, Texas, 1993, pp. 20502055.
[20] R.A. de Callafon, Feedback Oriented Identication for Enhanced
and Robust Control: A Fractional Approach Applied to a Wafer
Stage. PhD thesis. Delft University of Technology, 1998.
[21] U. Holmberg, S. Valentinotti, D. Bonvin, An identication-forcontrol procedure with robust performance, Control Engineering
Practice 8 (2000) 11071117.
[22] B.L. Cooley, J.H. Lee, Control-relevant experiment design for
multivariable systems described by expansions in othonormal
bases, Automatica 37 (2) (2001) 273281.
[23] I.D. Landau, From robust control to adaptive control, Control
Engineering Practice 7 (9) (1999) 11131124.
531